Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

被引:0
|
作者
Rafael Tonicelli
Anderson C. A. Nascimento
Rafael Dowsley
Jörn Müller-Quade
Hideki Imai
Goichiro Hanaoka
Akira Otsuka
机构
[1] University of Brasilia,Department of Electrical Engineering
[2] Karlsruhe Institute of Technology,Institute of Theoretical Informatics
[3] National Institute of Advanced Industrial Science and Technology (AIST),undefined
关键词
Information-theoretic cryptography; Cryptographic primitives; Oblivious polynomial evaluation; Commodity-based model;
D O I
暂无
中图分类号
学科分类号
摘要
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial p(x)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p(x)$$\end{document} and a receiver inputs a single value x0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$x_{0}$$\end{document}. At the end of the protocol, the sender learns nothing and the receiver learns p(x0)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p(x_{0})$$\end{document}. This paper deals with the problem of oblivious polynomial evaluation under an information-theoretic perspective, which is based on the definitions of unconditional security developed by Crépeau et al. (Information-theoretic conditions for two-party secure function evaluation. EUROCRYPT 2006, LNCS 4004. Springer, Berlin, Heidelberg, pp 538–554, 2006). In this paper, we propose an information-theoretic model for oblivious polynomial evaluation relying on pre-distributed data and prove very general lower bounds on the size of the pre-distributed data, as well as the size of the communications in any protocol. It is demonstrated that these bounds are tight by obtaining a round-optimal OPE protocol, which meets the lower bounds simultaneously. We present a natural generalization to OPE called oblivious linear functional evaluation.
引用
收藏
页码:73 / 84
页数:11
相关论文
共 50 条
  • [21] Information-Theoretically Secure Neural Network Training with Flexible Deployment
    Zhou, Hengcheng
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT V, 2023, 14258 : 324 - 336
  • [22] An information-theoretically secure quantum multiparty private set intersection
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [23] PERCOLATION ON THE INFORMATION-THEORETICALLY SECURE SIGNAL TO INTERFERENCE RATIO GRAPH
    Vaze, Rahul
    Iyer, Srikanth
    JOURNAL OF APPLIED PROBABILITY, 2014, 51 (04) : 910 - 920
  • [24] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [25] Information-Theoretically Secure and Highly Efficient Search and Row Retrieval
    Sharma, Shantanu
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Kumari, Komal
    Roychoudhury, Swagnik
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (10): : 2391 - 2403
  • [26] ITSEC: An Information-theoretically Secure Framework for Truthful Spectrum Auctions
    Chen, Zhili
    Huang, Liusheng
    Chen, Lin
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [27] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    Cluster Computing, 2021, 24 : 3591 - 3606
  • [28] Information-Theoretically Secure Key-Insulated Key-Agreement
    Seito, Takenobu
    Shikata, Junji
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [29] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [30] Information-Theoretically Secure Entity Authentication in the Multi-user Setting
    Hajime, Shogo
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417